Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?

Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?A . Shut down the VDI and copy off the event logs. B. Take a memory snapshot of the running system. C. Use NetFlow to identify command-and-control IPs. D. Run a full on-demand...

January 19, 2023 No Comments READ MORE +

Which of the following should the organization use to compare biometric solutions?

An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?A . FRR B. Difficulty of use C. Cost D. FAR E. CERView AnswerAnswer: A

January 19, 2023 No Comments READ MORE +

Which of the following organizations sets frameworks and controls for optimal security configuration on systems?

Which of the following organizations sets frameworks and controls for optimal security configuration on systems?A . ISO B. GDPR C. PCI DSS D. NISTView AnswerAnswer: D

January 19, 2023 No Comments READ MORE +

Which of the following options BEST fulfils the architect’s requirements?

DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the following options BEST fulfils the architect’s requirements?A . An orchestration solution that can adjust scalability of...

January 19, 2023 No Comments READ MORE +

Which of the following backup types should be used?

A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?A . Snapshot B. Differential C. Cloud D. Full E. IncrementalView AnswerAnswer: A

January 19, 2023 No Comments READ MORE +

Which of the following is the BEST solution to meet the requirement?

The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs....

January 18, 2023 No Comments READ MORE +

Which of the following would BEST allow the company to meet this requirement?

A company is implementing BYOD and wants to ensure all users have access to the same cloud-based services. Which of the following would BEST allow the company to meet this requirement?A . laaS B. PasS C. MaaS D. SaaSView AnswerAnswer: D

January 18, 2023 No Comments READ MORE +

Which of the following should be done FIRST?

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done FIRST?A . Configure heat maps. B. Utilize captive portals. C. Conduct...

January 18, 2023 No Comments READ MORE +

Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?

Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?A . EOL B. SLA C. MOU D. EOSLView AnswerAnswer: B

January 18, 2023 No Comments READ MORE +

In order to reslnct PHI documents which of the following should be performed FIRST?

A company wants to restrict emailing of PHI documents. The company is implementing a DLP solution. In order to reslnct PHI documents which of the following should be performed FIRST?A . Retention B. Governance C. Classification D. Change managementView AnswerAnswer: C

January 18, 2023 No Comments READ MORE +